Processing Your Payment

Please do not leave this page until complete. This can take a few moments.

March 7, 2022

With international tension building, threat of cyberattacks grows

As the world witnesses the horrible scenes of war in Ukraine, the conversation about the use of cyber weapons continues to escalate.

It’s clear that international conflict today includes not only physical weapons, but also digital weapons, used hand-in-hand as modern warfare techniques, both with the potential of delivering devastating results.

Russian attackers targeting private organizations and government bodies in the United States is not new. The federal government has spoken openly about Russian links to high profile attacks against entities such as the Colonial Pipeline and SolarWinds.

Rob Simopoulos portrait
Courtesy / Defendify
Rob Simopoulos of Defendify

The U.S. has endured foreign attacks launched by state sponsored threat actors, and criminal gangs from international countries for many years. And it’s not just Russian linked attackers; cyber attackers can be found operating around the globe. As an example, it was recently reported that Iranian government sponsored attackers are launching ransomware attacks on critical infrastructure organizations and governments worldwide, including organizations in North America.

Schools, hospitals, small businesses at risk

The U.S. Cybersecurity and Infrastructure Agency has released a new website called Shields Up as a way to provide cybersecurity intel and guidance to private companies here. It’s recommended that business leaders, both in IT and non-IT roles, review the site regularly to understand potential threats.

Cyber attackers don’t discriminate, and successful attacks have occurred at schools, hospitals, municipalities and small businesses. The war in Ukraine is yet another reminder that cyberattacks are increasing and target organizations small and large. Ransomware — where attackers lock systems and demand payment in exchange for an “unlock key” — and other data extorsion techniques has seen an alarming increase in 2021. 

Here are 5 steps every business should consider:

Empower your IT team: If you are the non-IT business leader, it is time to engage in strategic conversations with your IT team, whether they are internal or third-party. Ask questions and learn about what steps you can take to increase your cybersecurity protection. Cybersecurity today is a key business risk for all organizations. Understand what you have and where you can improve, then empower your IT teams with ongoing support, training, and budget. 

Train your team: From the CEO to the intern, every team member in your organization can assist in improving your cyber defense. Most people have never had formal cybersecurity training — we don’t teach that in school — yet most cyberattacks begin with a phishing email. If you train your team regularly on how to identify and deal with these emails, you can enable them to become key company cyber defenders. 

Get tested: Attackers scan and hunt for weaknesses and holes in company networks, hardware and software. They use technology tools and manual hacking techniques to infiltrate systems, so it’s important to keep your systems regularly updated with software patches to help prevent breaches. Further, organizations can perform vulnerability assessments on their systems which includes vulnerability scanning, a tool that scans for vulnerabilities on software and hardware. Also, conduct penetration testing in which an ethical hacker mimics the actions of a criminal hacker by trying to breach your systems and provides detailed reports of weaknesses. Having your systems tested regularly and quickly closing the holes can help assist in keeping your IT infrastructure and business systems secure. 

24/7 protection: Cyberattackers don’t work 9-5. Attacks happen at all hours and around the clock. Many organizations are implementing cybersecurity protection that includes 24/7 monitoring and expert human response to cyberattacks on their systems. Like an alarm system with continuous response for your building, the very same thing exists for your IT systems. 

Cybersecurity insurance: Get cybersecurity insurance coverage in place and if you have it, discuss with your insurance provider the exclusion of “act of war." Are you covered if an attack on your company is determined to have originated from a country in conflict? Just like auto insurance won’t eliminate accidents from happening, cyber insurance alone won’t stop cyber incidents, but it can help provide critical financial assistance and guidance during the recovery.

Businesses should consider taking these key steps and continue to monitor the CISA Shields Up website to learn more about protecting their businesses during the Russia and Ukraine conflict. But in the end, the government cannot be relied upon to protect each and every business directly. Today that responsibility lays on each business themselves. If your organization hasn’t begun to implement comprehensive, defense-in-depth cybersecurity, this should be another reminder to consider getting started now.
 

Sign up for Enews

0 Comments

Order a PDF